Skip to content

Commit f04948f

Browse files
authored
Merge pull request #37 from opengovern/fix-controls
fix: fix entraid controls
2 parents a1014f1 + cdd44a8 commit f04948f

7 files changed

+7
-0
lines changed

compliance/controls/azure/azure_cis_v210_1_13.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ type: control
44
description: Require administrators or appropriately delegated users to register third-party applications.
55
integration_type:
66
- azure_subscription
7+
- entraid_directory
78
parameters: []
89
policy:
910
language: sql

compliance/controls/azure/azure_cis_v210_1_18.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ type: control
44
description: Restrict security group creation to administrators only.
55
integration_type:
66
- azure_subscription
7+
- entraid_directory
78
parameters: []
89
policy:
910
language: sql

compliance/controls/azure/azure_cis_v210_1_25.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ type: control
44
description: This recommendation aims to maintain a balance between security and operational efficiency by ensuring that a minimum of 2 and a maximum of 4 users are assigned the Global Administrator role in Microsoft Entra ID. Having at least two Global Administrators ensures redundancy, while limiting the number to four reduces the risk of excessive privileged access.
55
integration_type:
66
- azure_subscription
7+
- entraid_directory
78
parameters: []
89
policy:
910
language: sql

compliance/controls/azure/azure_cis_v210_1_2_6.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ type: control
44
description: This recommendation ensures that users accessing the Windows Azure Service Management API (i.e. Azure Powershell, Azure CLI, Azure Resource Manager API, etc.) are required to use multifactor authentication (MFA) credentials when accessing resources through the Windows Azure Service Management API.
55
integration_type:
66
- azure_subscription
7+
- entraid_directory
78
parameters: []
89
policy:
910
language: sql

compliance/controls/azure/azure_cis_v210_1_2_7.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ type: control
44
description: This recommendation ensures that users accessing Microsoft Admin Portals (i.e. Microsoft 365 Admin, Microsoft 365 Defender, Exchange Admin Center, Azure Portal, etc.) are required to use multifactor authentication (MFA) credentials when logging into an Admin Portal.
55
integration_type:
66
- azure_subscription
7+
- entraid_directory
78
parameters: []
89
policy:
910
language: sql

compliance/controls/azure/azure_cis_v210_1_4.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ type: control
44
description: Microsoft Entra ID is extended to include Azure AD B2B collaboration, allowing you to invite people from outside your organization to be guest users in your cloud account and sign in with their own work, school, or social identities. Guest users allow you to share your company's applications and services with users from any other organization, while maintaining control over your own corporate data. Work with external partners, large or small, even if they don't have Azure AD or an IT department. A simple invitation and redemption process lets partners use their own credentials to access your company's resources as a guest user. Guest users in every subscription should be review on a regular basis to ensure that inactive and unneeded accounts are removed.
55
integration_type:
66
- azure_subscription
7+
- entraid_directory
78
parameters: []
89
policy:
910
language: sql

compliance/controls/azure/azuread_user_should_have_mfa_enabled_with_azure_subscription_role_assignment.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ type: control
44
description: AzureAD Users should have MFA Enabled with Azure subscription role assignment
55
integration_type:
66
- azure_subscription
7+
- entraid_directory
78
parameters:
89
- key: entraidAccountStatusInclude
910
value: ""

0 commit comments

Comments
 (0)